CA2922158C - Method of authorizing an operation to be performed on a targeted computing device - Google Patents
Method of authorizing an operation to be performed on a targeted computing device Download PDFInfo
- Publication number
- CA2922158C CA2922158C CA2922158A CA2922158A CA2922158C CA 2922158 C CA2922158 C CA 2922158C CA 2922158 A CA2922158 A CA 2922158A CA 2922158 A CA2922158 A CA 2922158A CA 2922158 C CA2922158 C CA 2922158C
- Authority
- CA
- Canada
- Prior art keywords
- authorization
- computing device
- request
- targeted computing
- private
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
PERFORMED ON A TARGETED COMPUTING DEVICE
BACKGROUND
[1] The field of the present disclosure relates generally to mobile communication devices and, more specifically, to a mobile communication device that enables trusted operation of one or more isolated, virtualized operating systems running thereon.
As such, it may be desirable to incorporate enhanced security into a device virtualization architecture.
BRIEF DESCRIPTION
[6a] In yet another aspect, a method of authorizing an operation to be performed on a targeted computing device is provided. The method comprises:
generating, at a requesting device, a request to perform the operation on the targeted computing device; transmitting the request, from the requesting device, to an authentication server, the request being signed with a signature of the requesting device; receiving, at the authentication server, the request, and verifying the signature of the requesting device; upon verification of the signature of the requesting device, forming, at the authentication server, an authorization response that includes the request and an authorization token; transmitting the authorization response, from the authentication server, to the requesting device, the authorization response being signed with a signature of an authorization server; receiving, at the requesting device, the authorization response from the authentication server that includes the authentication token and the request, and verifying the signature of the authorization server;
transmitting the authorization response, from the requesting device, to the targeted computing device, the authorization response being signed with the signature Date recue / Date received 2021-11-29 of the requesting device; receiving, at the targeted computing device, the authorization response, that includes the request to perform the operation, and verifying the signature of the requesting device; and upon verification of the signature of the requesting device, granting, at the targeted computing device, authorization to perform the operation.
[6b] In yet another aspect, a method of authorizing an operation to be performed on a targeted computing device is provided. The method is performed at a computer, and comprises: generating a request to perform the operation on the targeted computing device; signing the request with a private key of a first private, public key pair; transmitting the request to an authentication server for verification with a public key of the first private, public key pair; receiving an authorization response from the authentication server upon verification of the request, the authorization response including the request and an authorization token and being signed with a private key of a second private, public key pair; verifying the authorization response with a public key of the second private, public key pair; and transmitting the authorization response that includes the request and the authorization token to the targeted computing device, the authorization response including the request to perform the operation and being signed with the private key of the first private, public key pair, thereby to grant the targeted computing device authorization to perform the operation.
[6c] In yet another aspect, a method of authorizing an operation to be performed on a targeted computing device is provided. The method comprises generating, at a requesting device, a request to perform the operation on the targeted computing device; signing, at the requesting device, the request with a private key of a first private, public key pair; transmitting the request, from the requesting device, to an authentication server; receiving, at the authentication server, the request from the requesting device verifying, at the authentication server, the request with a public key of the first private, public key pair; forming, at the authentication server, an authorization response that includes the request and an authorization token;
signing, by the authentication server, the authorization response with a private key of a second -2a-Date recue / Date received 2021-11-29 private, public key pair; transmitting the authorization response, from the authentication server, to the requesting device; receiving, at the requesting device, the authorization response from the authentication server that includes the request and the authorization token; verifying, at the requesting device, the authorization response with a public key of the second private, public key pair; signing, by the requesting device, the authorization response with the private key of the first private, public key pair; transmitting, by the requesting device, the authorization response to the targeted computing device; receiving, by the targeted computing device, the authorization response from the requesting device, the authorization response including the request to perform the operation and the authorization token; verifying, by the targeted computing device, the authorization response with the public key of the first private, public key pair; and granting, by the targeted computing device, authorization to perform the operation upon verification of the authorization response.
[6d] In yet another aspect, a method of requesting an operation to be performed on a targeted computing device is provided. The method comprises generating a request to perform the operation on the targeted computing device, the request including a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, and a time period in which the operation will be performed; signing the request with a private key of a first private, public key pair; transmitting the request to an authentication server; receiving, in response to the request, an authorization response from the authentication server that includes the request and an authorization token, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device;
and transmitting the authorization response to the targeted computing device.
-2b-[6e] In yet another aspect, a method of authorizing an operation to be performed on a targeted computing device is provided. The method comprises receiving, at an authentication server, a request from a requesting device to perform the operation on the targeted computing device, the request including parameters that include a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, and a time period in which the operation will be performed; verifying, at the authentication server, the request with a public key of a first private, public key pair, wherein the request is signed by a private key of the first private, public key pair; forming, at the authentication server in response to the request, an authorization response that includes the request and an authorization token, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device; and transmitting, at the authentication server, the authorization response to the requesting device.
[6f] In yet another aspect, a method of carrying out an operation on a targeted computing device is provided. The method comprises receiving, at a requesting device, an authorization response from an authorization server, the authorization response including a request to perform the operation on the targeted computing device, including parameters that include a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, a time period in which the operation will be performed, and an authorization token, the authorization response generated by the authorization server in response to the request, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device; verifying, at the requesting device, the authorization response with a public key of a private, public key pair, wherein the authorization response is signed by a private key of the private, public key pair; and.
granting, at the requesting device, authorization to perform the operation upon verification of the authorization response.
-2c-BRIEF DESCRIPTION OF THE DRAWINGS
-2d-
DETAILED DESCRIPTION
In the exemplary implementation, mobile communication device 10 is provided for supporting voice communication with another device, such as another mobile communication device.
Moreover, mobile communication device 10 may include a variety of other functionalities, including network access, SMS messaging, hosting of one or more applications, data processing, encryption, and/or other functions. Mobile communication device 10 may be a smartphone, configured to communicate through one or more cellular networks. In an alternative implementation, mobile communication device 10 may operate exclusively over a non-cellular network such as a WiFi and/or satellite network.
Input devices 16 may include, for example, buttons, a keyboard, a microphone, a vibe, a pointing device, a stylus, a touch sensitive panel (e.g., a touch pad or a touch screen), a gyroscope, an accelerometer, a digital compass, a position detector, a camera, a second camera, an ambient light sensor, and/or an audio input interface. In the exemplary implementation, a single component, such as a touch screen 18, functions as both presentation device 14 and input device 16.
Security features include an input device 16 such as a security button 17 and a presentation device 14 such as a plurality of LEDs. More specifically, mobile communication device 10 includes a first LED 19 and a second LED 21. As will be described in more detail below, the security features may be used to change and/or verify an operational, trusted status of mobile communication device 10.
In an alternative implementation, mobile communication device 10 may include any type and/or number of presentation devices that enable the security features to function as described herein.
For example, processor 24 may be programmed by encoding an operation as executable instructions and providing the executable instructions in memory 22.
The above examples are exemplary only, and thus are not intended to limit in any way the definition and/or meaning of the term processor.
[24] Memory 22, as described herein, is one or more devices that enable information such as executable instructions and/or other data to be stored and retrieved. Memory 22 may include one or more computer-readable media, such as, without limitation, dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM), static random access memory (SRAM), a solid state disk, and/or a hard disk.
Memory 22 may be configured to store, without limitation, executable instructions, operating systems, applications, resources, installation scripts and/or any other type of data suitable for use with the methods and systems described herein.
More specifically, secure element 64 stores data encryption keys, passwords, and hardware and software configuration information. Further, secure element 64 generates public key pairs and facilitates restricting export of associated private keys. In an alternative implementation, secure element 64 may be implemented with a TPM.
cards associated with two different cellular accounts, selectable by a user of mobile communication device 10. For example, mobile communication device 10 may access a personal cellular account and a business cellular account, allowing the user to select therebetween to separate personal usage and business usage. It should be appreciated that a different number of SIM card sockets may be included in other implementations.
60, second TPM 62, and cellular controller 31 are provided at least partially in hardware, it should be further appreciated that one or more components integrated into mobile communication device 10 may be provided through software and/or firmware associated with processor 24. In one example, processor 24 provides an air interface firewall, configured to analyze low-level air interface protocols of mobile communication device 10 and permit or deny network transmissions based on approved network identities and characteristics. In this example, air interface protocol data from cellular controller 31 containing cellular network identities and characteristics is provided to processor 24 and analyzed by processor 24 to determine if mobile communication device 10 should be permitted to conduct network transmissions via cellular networks identified by cellular controller 31. In this example, the level of analysis provided adds network security to mobile communication device 10 by having processor 24 further authenticate the network connections of cellular controller 31 beyond using standard cellular network protocol authentication mechanisms of cellular controller 31 by themselves. It should be noted that other air interface components of mobile communication device 10, such as, for example a Bluetooth controller and/or a Wi-Fi controller, may also be monitored by the air interface firewall. In an alternative implementation, first TPM 60 and second TPM 62 may be implemented in software.
In the exemplary implementation, software architecture 100 includes an operating system 104 installed on a hardware platform 102 that includes processor 24 and memory 22. Hardware platform 102 includes the components of mobile communication device 10 described above.
Software architecture 100 also includes a virtualization software layer, such as a hypervisor 106, that runs on top of operating system 104 (i.e., a type 2 hypervisor) and a security supervisor 108 coupled in communication with hypervisor 106. In an alternative implementation, hypervisor 106 may be installed and operate on hardware platform 102 (i.e., a type 1 hypervisor).
Hypervisor 106 supports a plurality of virtual machine execution spaces such that a plurality of virtual machines may be concurrently instantiated and executed.
114 and second TEE 124 from each other. As such, each persona will not be affected by other operating systems running on mobile communication device 10. Further, first persona 110 and second persona 120 may be configured to establish mutual trust between first TEE 114 and second TEE 124.
Establishing such mutual trust enables a trusted communication pathway to be formed between first persona 110 and second persona 120. Communication between first TEE 114 and second TEE 124 may only be allowed by mutual agreement in the security policies of first persona 110 and second persona 120. Further, a high assurance guard (not shown) may be implemented to facilitate restricting a flow of data between first persona 110 and second persona 120. For example, the high assurance guard may facilitate restricting the flow of sensitive and/or classified data between first persona 110 and second persona 120, while allowing the flow of unclassified data th ereb etwe en .
Further, a plurality of applications 130 may be acquired from an external source (not shown) and run on top of first persona OS 112.
112 facilitates ensuring trusted operation of mobile communication device 10 while maintaining control of the TEE services with the persona owner. Further, allowing first TEE 114 to control first TPM 60 facilitates isolating sensitive information from first persona OS 112 such that the information is in a more secure and protected environment.
60 that enable uncertified hardware accelerated cryptography, suite B, and/or certified encryption. Mobile communication device 10 may also include a VPN
module and/or a VoIP module. The VPN module enables first persona 110 to authenticate a VPN
and communicate with encryption without authentication or encryption keys being visible to untrusted code. Additionally, the VoIP module enables first persona 110 to establish and authenticate a VoIP call and communicate with encryption without authentication or encryption keys being visible to untrusted code.
For example, the trust of first TEE 114 is defined by the integrity of its static image when loaded by platform hardware 102 as will be described in more detail below. More specifically, the code loaded into first TEE 114 is validated against a trust anchor during loading, and the image is immutable once it is loaded. Because the image is immutable, first TEE 114 may only be changed by loading a new signed image over first TEE 114. Further, first persona OS 112 and second persona OS 122 may use resources outside of their own execution environment to manage their integrity. For example, the loading of the operating systems may be encrypted and validated, and the operating systems' access to hardware resources may be limited and enforced through configurations .. outside of their control.
The chain of trust continues unbroken through hypervisor 106 to facilitate establishing isolated execution environments, validating components within mobile communication device 10, and/or storing measurements in the trusted platform modules for later use by the user code to bind against the trusted state.
Security supervisor 108 runs in an isolated environment and may have access to platform resources, additional interfaces, and/or additional capabilities. In some implementations, first persona 110 and second persona 120 are separated through a trusted mechanism (i.e., CPU
virtualization) such that a persona owner cannot configure a security policy of a persona that is not owned by that persona owner. For example, the security policy of first persona 110 may only be configured by a first persona owner, and the security policy of second persona 120 may only be configured by a second persona owner. More specifically, each security policy may be signed by the private key of the persona owner and the signature may be validated by mobile communication device 10 using a corresponding public key of the persona owner before security supervisor 108 applies to security policy to the associated persona. Ownership and security policies for first persona 110 and second persona 120 are stored in a configuration file that may be maintained by security supervisor 108. Further, the ownership and security policies are validated by cryptographic certificates. As such, each persona owner may define the operating system, trusted execution environment, and security policy for the persona that it owns.
For example, the root of trust information may include root of trust information for mobile communication device 10 and/or for a persona running on mobile communication device 10. As such, the user may verify the root of trust information and safely enter the requested credentials. In an alternative implementation, the authentication dialogue may be verified when LEDs 19 and 21 are activated in a predetermined configuration.
122, to transfer ownership from the default trust anchor to the created 212 root of trust. The transfer is then authorized 216 and mobile communication device 10 is rebooted 218.
Replacement signatures are then transferred 236 from DM 204 to mobile communication device 10, and mobile communication device 10 validates the signatures and replaces the old signatures on the persona assets with the new signatures.
Authorization server 304 then generates an authorization response if the request has been authorized. The authorization response may include the request from DM 302 and an authorization token created by authorization server 304. The authorization token may be used to authorize the requested operation. In some embodiments, the authorization token may have a predetermined authorization period in which the requested operation may be performed, may be restricted to granting authorization for a particular targeted computing device, and/or may authorize performance of a single or multiple operations on mobile communication device 10. As an example only, the authorization token may include authorization to perform the operation on a predetermined targeted computing device, and/or authorization to perform a predetermined operation on the targeted computing device. Moreover, the authorization token may be generated at least one of prior to receiving the request to perform the operation on mobile communication device 10 and in response to verification of the request to perform the operation on mobile communication device 10. The authorization response may then be signed by a second private key of a private, public key pair associated with the authorization server computer and transmitted to the administrator computer. In an alternative implementation, the authorization response may be signed by an authentication operator. For example, the request may be queued and either signed, granted, or denied by the authentication operator. In some implementations, the authorization response may be transmitted via a removable media (not shown).
[651 DM 302 receives the authorization response and determines whether the authorization token authorizes the requested operation. For example, DM 302 may verify the authorization response with a public key of the second private, public key pair, wherein the authorization response is signed with a private key of the second private, public key pair. DM
302 then transmits the authorization response file to mobile communication device 10 to request an operation to be performed if the request has been authorized. Transmitting the authorization response may include signing the authorization response with the private key of the first private, public key pair. Mobile communication device 10 receives the authorization response and verifies the signatures with a public key of the first private, public key pair associated with the administrator computer, and determines whether the parameters specified in the authorization response align with the security policy for mobile communication device 10.
Mobile communication device 10 allows the requested operation to proceed if the signatures are verified and the parameters align. The privileged operation may then be performed on mobile communication device 10. In an alternative implementation, the authorization response may include a certificate chain to an authorization root of trust. Further, in an alternative implementation, the authorization token may be generated and transmitted via sneaker-net.
[66] Figure 7 is a flow diagram of an exemplary method of updating persona software that may be used with mobile communication device 10. In the exemplary implementation, operator 400 may update an existing persona OS, such as second persona 120, by coupling a USB cable from a Device Manager (DM) Workstation 402 to mobile communication device 10. Device management software is run and operator 400 directs mobile communication device 10 to reboot 410. During reboot 410, mobile communication device 10 detects the USB connection and enters a programming mode such that the persona operating systems do not load. Operator 400 then directs the DM software 412 to request 414 an update to a persona OS on mobile communication device 10. DM workstation 402 contacts an authorization server to obtain an authorization token. The authorization token may be cached and/or loaded from an offline source. Security supervisor 404 may then authorize 416 the request 414, and the persona update 418 may proceed. In some implementations, the DM
software will alert operator 400 and refuse to perform the updating process if a valid authorization token is not present.
[67] The DM workstation 402 includes a shared secret key that may be used to unlock secure element 406. Only storage encryption keys related to the authorized persona may be retrieved from secure element 406 using the authentication provided by the shared secret key.
Mobile communication device 10 then validates the authorization token to verify that operator 400 has the privileges to perform the requested operation. The user is authenticated 420 by secure element 406, and the operation is aborted if operator 400 does not have the proper credentials.
[68] The DM software then requests 422 device geometry data of the persona from mobile communication device 10. The device geometry data may include, but is not limited to, a size of the OS and TEE components of a persona. The software update proceeds if the persona geometry matches the device geometry, and the software update stops and an error is indicated if there is a mismatch. In an alternative implementation, the revision number of persona-owned packages may also be provided so the persona owner can verify compatibility of the update.
[69] The DM software starts the load process by transmitting 424 the software to be updated to mobile communication device 10. In one implementation, the software update begins by transmitting 426 the configuration of the persona if it is included in the update.
Security supervisor 404 then examines and evaluates the configuration file's geometry, root of trust, and signature to determine if a conflict will occur with other configuration files that arc already loaded on mobile communication device 10. The software update proceeds if the configuration file is validated 428 and/or if the configuration file is not being updated, and the software update stops if there is a conflict between configuration files.
Further, an updated operating system and/or a trusted execution environment may be loaded 430 and 432 onto mobile communication device 10.
[70] The transmitted software updates are stored on flash memory 408 and validated against the trust anchor. A persona transition file is then created 434 to indicate which software is to be updated, the software is written onto flash 408, and a checkpoint is created in the transition file after each update. For example, the new configuration file is written 436 onto flash 408 and the transition file is checkpointed 438, the new persona OS
filesystem is written 440 onto flash 408 and the transition file is checkpointed 442, and the new persona TEE
filesystem is written 444 onto flash 408 and the transition file is checkpointed 446. In the exemplary implementation, the target flash filesystems are programmed from the memory contents stored earlier, and are encrypted during transfer using storage keys from the configuration file. After the update is complete, buffer data is flushed 448 to flash 408, the persona transition file is deleted 450, and mobile communication device 10 is rebooted 452.
[71] Figure 8 is a flow diagram of an exemplary method of transitioning ownership of a persona that may be used with mobile communication device 10.
Ownership of a persona loaded on mobile communication device 10 may be transitioned to a new owner without updating the persona data. In the exemplary implementation, the new owner generates 510 a transfer ticket within device manager (DM) (New RoT) 502. The transfer ticket may be a block of data that details the specific device to be transitioned and the expected current root of trust.
The block of data is then sent to the current persona owner, and the current persona owner verifies the information within the current persona owner DM (New RoT) 502.
[72] The operator 500 working on behalf of the current persona owner then obtains an authorization token indicating whether the operator and the current persona owner are authorized 512 and 514 by DM (Old RoT) 503 to transfer the persona. The authorization token is then appended to and signs the transfer ticket, and the signed transfer ticket is transferred to and stored 516 on flash 508. The signed transfer ticket may also be returned to the prospective new persona owner along with an authentication key for the persona slot within secure element 506. In such an implementation, the authentication key may be wrapped using the new persona owner's DM operator public key that is attached to the transfer ticket. The operator working on behalf of the new persona owner may then use the wrapped transfer ticket to start the transfer process. More specifically, mobile communication device 10 may verify the credentials of the new persona owner and authorize the transfer.
[73] Operator 500 then couples a USB cable from a workstation of DM (New RoT) 502 to mobile communication device 10. Device management software is run and operator 500 directs mobile communication device 10 to reboot 518. During reboot 518, mobile communication device 10 detects the USB connection and enters a programming mode such that the persona operating systems do not load. Operator 500 then instructs the DM
software to transition a persona owned by the current persona owner to the new persona owner. The transfer ticket includes information required for authorization, and a public key infrastructure (PKI) certificate of operator 500 that serves to authenticate the request signed by the root of trust for the previous owner of the transitioned persona.
[74] The DM software uses the secret key of operator 500 to unwrap the authentication key from the transfer ticket. The authentication key may then be used 520 to request 522 persona transfer, and to authenticate 524 the operator to unlock secure element 506 on mobile communication device 10. In such an implementation, the authentication 524 only enables storage encryption keys related to the authorized persona to be retrieved from secure element 506.
[75] The transition further includes transferring 530 the old persona asset hashes to DM 502. DM 502 verifies the signatures and resigns the hashes with the new persona signing key that is authorized to sign the relevant assets. Further, the persona key that allows access to the persona media keys is changed, and the new value is transferred to DM 502.
Replacement signatures are then transferred 532 from DM 502 to mobile communication device 10, and mobile communication device 10 validates the signatures and replaces the old signatures on the persona assets with the new signatures.
[76] A persona transition file is then created 534, and the configuration file for the persona is checked for validity and conflicts with other configuration files that are already loaded on mobile communication device 10. The process proceeds if the configuration file is validated, and the software update stops if there is a conflict between configuration files. The user persona authentication is updated 536 upon authorization to proceed such that media keys may be accessed by the new root of trust and returned 538 to DM 502.
[77] DM 502 signs the assets that arc being updated and returns the signed hashes. For example, assets that are being updated may either have signatures that arc updated with re-signed hashes and/or may be updated 542 with new signatures. The persona transition file is checkpointed 540 after each update to enable the process to be restarted from an interrupted update. After the update is complete, buffer data is flushed 544 to flash 508, the persona transition file is deleted 546, and mobile communication device 10 is rebooted 548.
[78] After persona ownership has been transferred to the new persona owner, a new trust relationship may need to be established between the transitioned persona and any personas that had a trust relationship with the previous persona owner. More specifically, the persona configuration of the other personas running on mobile communication device 10 may have to be updated to establish a trust relationship with the new persona owner to maintain the same functionality as with the previous persona owner.
[79] Figure 9 is a flow diagram of an exemplary method of loading a new persona that may be used with mobile communication device 10. In the exemplary implementation, operator 600 couples a USB cable from a Device Manager (DM) Workstation 602 to mobile communication device 10. Device management software is run and operator 600 directs mobile communication device 10 to reboot 612. During reboot 612, mobile communication device 10 detects the USB connection and enters a programming mode such that the persona operating systems do not load. Operator 600 is then prompted 614 to authorize the USB connection with a device password held by the device owner, and the device password is entered 616 and authenticated 618 to unlock secure element 606. In an alternative implementation, mobile communication device 10 may be reinitialized and reset to a factory configuration.
[80] The DM software then requests 620 device geometry data of the persona from mobile communication device 10, and operator 600 directs DM Workstation 602 to load 622 the persona package into a specific persona slot. The device geometry data may include, but is not limited to, a size of' the OS and TEE components of a persona. The software update proceeds if the persona geometry matches the device geometry, and the software update stops and an error is indicated if there is a mismatch. In an alternative implementation, the revision number of persona-owned packages may also be provided so the persona owner can verify compatibility of the update.
[81] The DM software starts the load process by transmitting the software to be loaded onto mobile communication device 10. In one implementation, the software load begins by transmitting 624 the configuration file of the persona to mobile communication device 10.
Security supervisor 604 then examines and evaluates the configuration file's geometry, root of trust, and signature to determine if a conflict will occur with other configuration files that are already loaded on mobile communication device 10. The software load proceeds if the configuration file is validated 626, and the software load stops if there is a conflict between configuration files. In some implementations, a new persona OS and a new TEE
are loaded 628 and 630 onto mobile communication device 10.
[82] The transmitted software is stored on flash memory 608 and validated against the trust anchor. A persona transition file is then created 632 and written to indicate overwrite. The overwrite indication is a sentinel value written in a persistent manner such that appropriate recovery measures may be taken to recover from failure if the update process is interrupted. More specifically, storage media keys in secure element 606 for the persona are deleted 634, the old persona configuration file is erased 636, the persona flash filesystems are erased 638, and trusted platform module (TPM) 610 is forcecleared 640.
[83] The new persona may then be loaded onto mobile communication device 10 in a persistent manner. More specifically, the new configuration file is written 642 onto flash 608, user authentication data is read 644 by security supervisor 604, and the user is authenticated 646 to unlock secure element 606. A public encryption key (PEK) of a private, public key pair may then be created 648 and exported 650 to the persona owner from secure element 606. The persona owner signs the PEK with its certificate authority and the software load 654 proceeds if the configuration file is validated 652. The PEK is then returned to and stored 656 in secure element 606.
[84] The secret key of the PEK private, public key pair is stored and protected within secure element 606 such that it will not be exported from secure element 606. This enables a persona owner to verify, by the response signed by the private key, that a request to perform a service came from an authorized device. The PEK may be created at the time persona ownership is defined and may be used to authenticate a software update, request, and/or package, for example. In an alternative implementation, a second private, public key pair may be created and used for encryption such that a persona owner can encrypt data targeting a specific device and such that other devices would not be able to decrypt the data.
[85] The new persona OS filesystem is then written 658 onto flash 608, the new persona TEE filesystem is written 660 onto flash 608, and a new persona data partition is created 662. The target flash filesystems are programmed from the memory contents stored earlier, and are encrypted during transfer using storage keys from the configuration file. After the update is complete, the persona transition file is deleted 664 and mobile communication device 10 is rebooted 666.
[86] This written description uses examples to disclose various implementations, including the best mode, and also to enable any person skilled in the art to practice the various implementations, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the disclosure is defined by the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal language of the claims.
Claims (49)
generating, at a requesting device, a request to perform the operation on the targeted computing device;
transmitting the request, from the requesting device, to an authentication server, the request being signed with a signature of the requesting device;
receiving, at the authentication server, the request, and verifying the signature of the requesting device;
upon verification of the signature of the requesting device, forming, at the authentication server, an authorization response that includes the request and an authorization token;
transmitting the authorization response, from the authentication server, to the requesting device, the authorization response being signed with a signature of an authorization server;
receiving, at the requesting device, the authorization response from the authentication server that includes the authentication token and the request, and verifying the signature of the authorization server;
transmitting the authorization response, from the requesting device, to the targeted computing device, the authorization response being signed with the signature of the requesting device;
receiving, at the targeted computing device, the authorization response, that includes the request to perform the operation, and verifying the signature of the requesting device; and upon verification of the signature of the requesting device, granting, at the targeted computing device, authorization to perforin the operation.
Date Reçue/Date Received 2022-08-11
Date Recue/Date Received 2022-08-11
generating a request to perform the operation on the targeted computing device;
signing the request with a private key of a first private, public key pair;
transmitting the request to an authentication server for verification with a public key of the first private, public key pair;
receiving an authorization response from the authentication server upon verification of the request, the authorization response including the request and an authorization token and being signed with a private key of a second private, public key pair;
verifying the authorization response with a public key of the second private, public key pair; and Date Recue/Date Received 2022-08-11 transmitting the authorization response that includes the request and the authorization token to the targeted computing device, the authorization response including the request to perform the operation and being signed with the private key of the first private, public key pair, thereby to grant the targeted computing device authorization to perform the operation.
Date Recue/Date Received 2022-08-11
generating, at a requesting device, a request to perform the operation on the targeted computing device;
signing, at the requesting device, the request with a private key of a first private, public key pair;
transmitting the request, from the requesting device, to an authentication server;
receiving, at the authentication server, the request from the requesting device;
verifying, at the authentication server, the request with a public key of the first private, public key pair;
forming, at the authentication server, an authorization response that includes the request and an authorization token;
signing, by the authentication server, the authorization response with a private key of a second private, public key pair;
transmitting the authorization response, from the authentication server, to the requesting device;
receiving, at the requesting device, the authorization response from the authentication server that includes the request and the authorization token;
verifying, at the requesting device, the authorization response with a public key of the second private, public key pair;
signing, by the requesting device, the authorization response with the private key of the first private, public key pair;
transmitting, by the requesting device, the authorization response to the targeted computing device;
receiving, by the targeted computing device, the authorization response from the requesting device, the authorization response including the request to perform the operation and the authorization token;
Date Recue/Date Received 2022-08-11 verifying, by the targeted computing device, the authorization response with the public key of the first private, public key pair; and granting, by the targeted computing device, authorization to perform the operation upon verification of the authorization response.
Date Recue/Date Received 2022-08-11
generating a request to perform the operation on the targeted computing device, the request including a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, and a time period in which the operation will be performed;
signing the request with a private key of a first private, public key pair;
transmitting the request to an authentication server;
receiving, in response to the request, an authorization response from the authentication server that includes the request and an authorization token, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device; and Date Recue/Date Received 2022-08-11 transmitting the authorization response to the targeted computing device.
receiving, at an authentication server, a request from a requesting device to perform the operation on the targeted computing device, the request including parameters that include a geographic location of the targeted computing device, the Date Recue/Date Received 2022-08-11 operation to be performed on the targeted computing device, and a time period in which the operation will be performed;
verifying, at the authentication server, the request with a public key of a first private, public key pair, wherein the request is signed by a private key of the first private, public key pair;
forming, at the authentication server in response to the request, an authorization response that includes the request and an authorization token, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device; and transmitting, at the authentication server, the authorization response to the requesting device.
Date Recue/Date Received 2022-08-11
receiving, at a requesting device, an authorization response from an authorization server, the authorization response including a request to perform the operation on the targeted computing device, including parameters that include a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, a time period in which the operation will be performed, and an authorization token, the authorization response generated by the authorization server in response to the request, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perforiii predetermined operations on the targeted computing device;
verifying, at the requesting device, the authorization response with a public key of a private, public key pair, wherein the authorization response is signed by a private key of the private, public key pair; and granting, at the requesting device, authorization to perform the operation upon verification of the authorization response.
Date Recue/Date Received 2022-08-11
Date Recue/Date Received 2022-08-11
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/025,560 US9819661B2 (en) | 2013-09-12 | 2013-09-12 | Method of authorizing an operation to be performed on a targeted computing device |
| US14/025,560 | 2013-09-12 | ||
| PCT/US2014/045022 WO2015038220A1 (en) | 2013-09-12 | 2014-07-01 | Method of authorizing an operation to be performed on a targeted computing device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CA2922158A1 CA2922158A1 (en) | 2015-03-19 |
| CA2922158C true CA2922158C (en) | 2023-06-27 |
Family
ID=51298936
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA2922158A Active CA2922158C (en) | 2013-09-12 | 2014-07-01 | Method of authorizing an operation to be performed on a targeted computing device |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US9819661B2 (en) |
| EP (1) | EP3039604B1 (en) |
| JP (2) | JP2016535547A (en) |
| KR (1) | KR102217941B1 (en) |
| CN (1) | CN105531710B (en) |
| BR (1) | BR112016004501B1 (en) |
| CA (1) | CA2922158C (en) |
| ES (1) | ES2802265T3 (en) |
| RU (1) | RU2675902C2 (en) |
| SG (1) | SG11201601108YA (en) |
| TW (2) | TWI674533B (en) |
| WO (1) | WO2015038220A1 (en) |
Families Citing this family (55)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9942257B1 (en) | 2012-07-11 | 2018-04-10 | Amazon Technologies, Inc. | Trustworthy indication of software integrity |
| US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
| US9825944B2 (en) * | 2014-01-24 | 2017-11-21 | Microsoft Technology Licensing, Llc | Secure cryptoprocessor for authorizing connected device requests |
| US20150213433A1 (en) * | 2014-01-28 | 2015-07-30 | Apple Inc. | Secure provisioning of credentials on an electronic device using elliptic curve cryptography |
| US9542558B2 (en) * | 2014-03-12 | 2017-01-10 | Apple Inc. | Secure factory data generation and restoration |
| EP3129935A4 (en) * | 2014-04-08 | 2017-11-08 | Capital One Financial Corporation | Systems and methods for transacting at an atm using a mobile device |
| KR102209840B1 (en) * | 2014-04-22 | 2021-02-01 | 삼성전자주식회사 | Device for providing virtualization services and method thereof |
| US9858421B2 (en) * | 2014-07-02 | 2018-01-02 | Dell Products L.P. | Systems and methods for detecting hardware tampering of information handling system hardware |
| US10057072B2 (en) * | 2014-12-31 | 2018-08-21 | Schneider Electric USA, Inc. | Industrial network certificate recovery by identifying secondary root certificate |
| US10171427B2 (en) | 2015-01-29 | 2019-01-01 | WebCloak, LLC | Portable encryption and authentication service module |
| US11023968B2 (en) * | 2015-03-05 | 2021-06-01 | Goldman Sachs & Co. LLC | Systems and methods for updating a distributed ledger based on partial validations of transactions |
| US9578020B2 (en) | 2015-03-19 | 2017-02-21 | Sony Corporation | Module for controlling usability of a device |
| US10120696B2 (en) * | 2015-03-19 | 2018-11-06 | Sony Corporation | Method and device for controlling usability of a communication device |
| US10721063B2 (en) * | 2015-05-07 | 2020-07-21 | Nec Corporation | Secure computation data utilization system, method, apparatus and non-transitory medium |
| US10205712B2 (en) * | 2015-06-10 | 2019-02-12 | Mcafee, Llc | Sentinel appliance in an internet of things realm |
| US9686240B1 (en) | 2015-07-07 | 2017-06-20 | Sprint Communications Company L.P. | IPv6 to IPv4 data packet migration in a trusted security zone |
| US9727737B1 (en) | 2015-07-27 | 2017-08-08 | Amazon Technologies, Inc. | Trustworthy indication of software integrity |
| US9749294B1 (en) | 2015-09-08 | 2017-08-29 | Sprint Communications Company L.P. | System and method of establishing trusted operability between networks in a network functions virtualization environment |
| US10542115B1 (en) | 2015-10-01 | 2020-01-21 | Sprint Communications Company L.P. | Securing communications in a network function virtualization (NFV) core network |
| US9811686B1 (en) | 2015-10-09 | 2017-11-07 | Sprint Communications Company L.P. | Support systems interactions with virtual network functions in a trusted security zone |
| US9781016B1 (en) | 2015-11-02 | 2017-10-03 | Sprint Communications Company L.P. | Dynamic addition of network function services |
| US10459722B2 (en) * | 2015-11-24 | 2019-10-29 | Wind River Systems, Inc. | Device, system, and method for secure supervisor system calls |
| US10972262B2 (en) * | 2015-12-30 | 2021-04-06 | T-Mobile Usa, Inc. | Persona and device based certificate management |
| US10652023B2 (en) | 2015-12-30 | 2020-05-12 | T-Mobile Usa, Inc. | Persona and device based certificate management |
| CN106897874B (en) * | 2016-06-01 | 2021-02-09 | 创新先进技术有限公司 | Mobile payment method, device and system |
| US10210333B2 (en) * | 2016-06-30 | 2019-02-19 | General Electric Company | Secure industrial control platform |
| US20180012037A1 (en) * | 2016-07-05 | 2018-01-11 | Nxp B.V. | Secure operation apparatuses and methods therefor |
| EP3482337B1 (en) | 2016-07-11 | 2021-09-29 | Visa International Service Association | Encryption key exchange process using access device |
| EP3291504B1 (en) * | 2016-08-30 | 2020-03-11 | Wacom Co., Ltd. | Authentication and secure transmission of data between signature devices and host computers using transport layer security |
| US10303884B2 (en) * | 2016-09-22 | 2019-05-28 | Apple Inc. | Countersigning updates for multi-chip devices |
| US10250498B1 (en) | 2016-10-03 | 2019-04-02 | Sprint Communications Company L.P. | Session aggregator brokering of data stream communication |
| US10310885B2 (en) * | 2016-10-25 | 2019-06-04 | Microsoft Technology Licensing, Llc | Secure service hosted in a virtual security environment |
| EP3542274B1 (en) * | 2016-11-18 | 2025-01-01 | Veritas Technologies LLC | Systems and methods for performing secure backup operations |
| US10135899B1 (en) * | 2016-12-16 | 2018-11-20 | Amazon Technologies, Inc. | Dynamic archiving of streaming content |
| US12256024B2 (en) | 2017-06-21 | 2025-03-18 | Microsoft Technology Licensing, Llc | Device provisioning |
| US10348488B1 (en) | 2017-08-25 | 2019-07-09 | Sprint Communications Company L.P. | Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network |
| US10546276B2 (en) | 2017-09-13 | 2020-01-28 | Microsoft Technology Licensing, Llc | Cyber ownership transfer |
| US11374760B2 (en) * | 2017-09-13 | 2022-06-28 | Microsoft Technology Licensing, Llc | Cyber physical key |
| US10831877B1 (en) | 2018-03-05 | 2020-11-10 | Architecture Technology Corporation | Systems and methods for implementing multiple personas in a computing system |
| US11120137B2 (en) | 2018-06-19 | 2021-09-14 | Netgear, Inc. | Secure transfer of registered network access devices |
| US11223485B2 (en) * | 2018-07-17 | 2022-01-11 | Huawei Technologies Co., Ltd. | Verifiable encryption based on trusted execution environment |
| CN111654367B (en) * | 2018-08-31 | 2023-05-12 | 创新先进技术有限公司 | Cryptographic operation, method for creating working key, cryptographic service platform and equipment |
| WO2020107104A1 (en) * | 2018-11-30 | 2020-06-04 | BicDroid Inc. | Personalized and cryptographically secure access control in operating systems |
| US20200364354A1 (en) * | 2019-05-17 | 2020-11-19 | Microsoft Technology Licensing, Llc | Mitigation of ransomware in integrated, isolated applications |
| US11489675B1 (en) * | 2019-07-12 | 2022-11-01 | Allscripts Software, Llc | Computing system for electronic message tamper-roofing |
| US12045629B2 (en) | 2019-09-30 | 2024-07-23 | Microsoft Technology Licensing, Llc | Securely configuring target devices using device identity |
| FR3105703A1 (en) * | 2019-12-20 | 2021-06-25 | Orange | Administration technique for an access profile to a communication network |
| CN111737678B (en) * | 2020-06-18 | 2024-05-24 | 海尔优家智能科技(北京)有限公司 | Binding method and device of target equipment, storage medium and electronic device |
| TWI804754B (en) | 2020-09-08 | 2023-06-11 | 四零四科技股份有限公司 | Certificate management system and certificate management method |
| US11847205B1 (en) | 2020-10-26 | 2023-12-19 | T-Mobile Innovations Llc | Trusted 5G network function virtualization of virtual network function elements embedded on a system-on-chip |
| US12363140B2 (en) * | 2021-03-26 | 2025-07-15 | CyDeploy, Inc. | Security compatibility testing and configuration platform |
| TWI803907B (en) * | 2021-07-19 | 2023-06-01 | 臺灣網路認證股份有限公司 | System for confirming identity on different devices by verifying valid certification and method thereof |
| US12267442B2 (en) * | 2022-07-20 | 2025-04-01 | Arista Networks, Inc. | Establishing trust between supervisors in a network device |
| US20240297792A1 (en) * | 2023-03-03 | 2024-09-05 | Sierra Wireless, Inc. | System and method for secure approval of operations requested by a device management system |
| US20250007726A1 (en) * | 2023-06-27 | 2025-01-02 | Dell Products L.P. | Key possession based verification in endpoint devices |
Family Cites Families (96)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5320554A (en) | 1992-10-02 | 1994-06-14 | Compaq Computer Corp. | Attachment unit interface connector |
| US5778304A (en) * | 1994-03-10 | 1998-07-07 | Motorola, Inc. | Method for providing communication services based on geographic location |
| KR100277689B1 (en) * | 1998-12-04 | 2001-01-15 | 정선종 | User Authentication Method in Open Network |
| JP3873624B2 (en) * | 1999-01-13 | 2007-01-24 | 株式会社日立製作所 | Mobile code execution method and system |
| JP2000316006A (en) | 1999-04-28 | 2000-11-14 | Nec Corp | Node having provision for bus manager function automatic changeover, mobile terminal and mobile terminal system |
| US6636750B1 (en) | 1999-10-15 | 2003-10-21 | Motorola, Inc. | Speakerphone accessory for a portable telephone |
| JP2001320178A (en) | 2000-05-02 | 2001-11-16 | Nec Yonezawa Ltd | Electronic device |
| DE20009217U1 (en) | 2000-05-22 | 2000-08-24 | Lu, Ping Chang, Taipeh/T'ai-pei | Battery pack for cell phones |
| US20020091931A1 (en) * | 2001-01-05 | 2002-07-11 | Quick Roy Franklin | Local authentication in a communication system |
| EP1442391B1 (en) | 2001-10-17 | 2005-08-31 | Infineon Technologies AG | Method and device for guaranteeing a calculation in a cryptographic algorithm |
| US20030115447A1 (en) | 2001-12-18 | 2003-06-19 | Duc Pham | Network media access architecture and methods for secure storage |
| US20040204096A1 (en) | 2002-03-08 | 2004-10-14 | Koninklijke Philips Electronics N.V. | RF and BB subsystems interface |
| ATE254773T1 (en) * | 2002-03-18 | 2003-12-15 | Ubs Ag | SECURE USER AUTHENTICATION OVER A COMMUNICATIONS NETWORK |
| US7809953B2 (en) | 2002-12-09 | 2010-10-05 | Research In Motion Limited | System and method of secure authentication information distribution |
| JP2004265139A (en) * | 2003-02-28 | 2004-09-24 | Nec Corp | Content execution system, personal digital assistant, external apparatus, content execution method and program |
| TW594544B (en) | 2003-05-14 | 2004-06-21 | Benq Corp | Interface device for automatically determining peripherals and electronic device having such a function |
| DE10338032B4 (en) | 2003-08-19 | 2009-12-17 | Infineon Technologies Ag | Processor with electronic backups to store secret data |
| US7574603B2 (en) * | 2003-11-14 | 2009-08-11 | Microsoft Corporation | Method of negotiating security parameters and authenticating users interconnected to a network |
| US7305260B2 (en) | 2004-01-30 | 2007-12-04 | Nokia Corporation | Function specific interchangeable cover piece for a mobile communication device |
| US20050177661A1 (en) | 2004-02-10 | 2005-08-11 | Loo Fok K. | Multimedia playback device with a USB controller |
| JP4420201B2 (en) * | 2004-02-27 | 2010-02-24 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Authentication method using hardware token, hardware token, computer apparatus, and program |
| US7380119B2 (en) | 2004-04-29 | 2008-05-27 | International Business Machines Corporation | Method and system for virtualization of trusted platform modules |
| US7565522B2 (en) | 2004-05-10 | 2009-07-21 | Intel Corporation | Methods and apparatus for integrity measurement of virtual machine monitor and operating system via secure launch |
| US7552476B2 (en) * | 2004-06-25 | 2009-06-23 | Canon Kabushiki Kaisha | Security against replay attacks of messages |
| US7715559B2 (en) | 2004-08-26 | 2010-05-11 | Motorola, Inc. | Crypto-synchronization for secure communication |
| US20110255226A1 (en) | 2004-09-08 | 2011-10-20 | Belkin International, Inc. | Electrical Accessory and Method of Providing Same |
| US7865917B2 (en) | 2004-12-17 | 2011-01-04 | Martin E Hellman | Security enhanced tiered subscription broadcast system |
| JP4594753B2 (en) * | 2005-01-24 | 2010-12-08 | 日本放送協会 | Content usage license transmission device, content usage license transmission program, and content usage license reception program |
| US20060230439A1 (en) | 2005-03-30 | 2006-10-12 | Smith Ned M | Trusted platform module apparatus, systems, and methods |
| US8619971B2 (en) | 2005-04-01 | 2013-12-31 | Microsoft Corporation | Local secure service partitions for operating system security |
| US7747021B2 (en) | 2005-05-18 | 2010-06-29 | General Dynamics C4 Systems, Inc. | Method and apparatus for fast secure session establishment on half-duplex point-to-point voice cellular network channels |
| US7643817B2 (en) | 2005-05-18 | 2010-01-05 | General Dynamics C4 Systems, Inc. | Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels |
| US7728549B2 (en) | 2005-10-21 | 2010-06-01 | Matthew Bartlett | Battery pack including an emergency back-up battery for use in mobile electronic devices |
| EP1814028A1 (en) | 2006-01-27 | 2007-08-01 | Siemens Aktiengesellschaft | Method for implementing applications on independent partitions with optimized operating systems |
| US7856653B2 (en) | 2006-03-29 | 2010-12-21 | International Business Machines Corporation | Method and apparatus to protect policy state information during the life-time of virtual machines |
| KR20140109513A (en) | 2006-05-09 | 2014-09-15 | 인터디지탈 테크날러지 코포레이션 | Secure time functionality for a wireless device |
| KR100725522B1 (en) | 2006-09-01 | 2007-06-07 | 삼성전자주식회사 | Partial lock control method of mobile device with contact input unit |
| US8843222B2 (en) | 2007-01-08 | 2014-09-23 | Varia Holdings Llc | Selective locking of input controls for a portable media player |
| CN101821720B (en) | 2007-02-13 | 2014-04-16 | 谷歌公司 | Modular wireless communicator |
| US7863856B2 (en) | 2008-01-11 | 2011-01-04 | Modu Ltd. | Bi-directional battery charging for coupled electronic devices |
| US20080244261A1 (en) | 2007-03-29 | 2008-10-02 | Wiseman Willard M | Separation of logical trusted platform modules within a single physical trusted platform module |
| JP5213353B2 (en) | 2007-05-17 | 2013-06-19 | キヤノン株式会社 | COMMUNICATION TERMINAL, COMMUNICATION TERMINAL CONTROL METHOD, COMMUNICATION DEVICE, AND COMMUNICATION DEVICE CONTROL METHOD |
| US7792544B2 (en) | 2007-05-25 | 2010-09-07 | Motorola, Inc. | Method and apparatus for disabling the user interface of electronic devices |
| CN201063805Y (en) | 2007-06-28 | 2008-05-21 | 中兴通讯股份有限公司 | A mobile terminal with expandable functions |
| US8060074B2 (en) * | 2007-07-30 | 2011-11-15 | Mobile Iron, Inc. | Virtual instance architecture for mobile device management systems |
| US8060876B2 (en) | 2007-08-10 | 2011-11-15 | Intel Corporation | Methods and apparatus for creating an isolated partition for a virtual trusted platform module |
| US8032741B2 (en) | 2007-08-22 | 2011-10-04 | Intel Corporation | Method and apparatus for virtualization of a multi-context hardware trusted platform module (TPM) |
| TW200910202A (en) | 2007-08-30 | 2009-03-01 | Behavior Tech Computer Corp | Multimedia access device, multimedia display system comprising the multimedia access device, and multimedia data display method |
| US8130206B2 (en) | 2007-10-09 | 2012-03-06 | Nokia Corporation | Apparatus, method, computer program and user interface for enabling a touch sensitive display |
| IL187043A0 (en) | 2007-10-30 | 2008-02-09 | Sandisk Il Ltd | Secure pipeline manager |
| US8220029B2 (en) | 2007-11-13 | 2012-07-10 | Samsung Electronics Co., Ltd. | Method and system for enforcing trusted computing policies in a hypervisor security module architecture |
| US8150452B2 (en) | 2007-11-16 | 2012-04-03 | Standard Microsystems Corporation | Providing a connection between a memory medium of a mobile device and an external device |
| US9363258B2 (en) * | 2007-12-17 | 2016-06-07 | International Business Machines Corporation | Secure digital signature system |
| US8259948B2 (en) | 2007-12-29 | 2012-09-04 | Intel Corporation | Virtual TPM key migration using hardware keys |
| US20090181735A1 (en) | 2008-01-02 | 2009-07-16 | Griffin Jr Paul P | Reception Boosting Accessory |
| EP2261832A4 (en) | 2008-02-25 | 2012-09-26 | Panasonic Corp | INFORMATION PROCESSING DEVICE |
| KR20090095909A (en) | 2008-03-06 | 2009-09-10 | 삼성전자주식회사 | Data storage device and data management method thereof |
| EP2269358A2 (en) | 2008-04-22 | 2011-01-05 | Barclays Capital Inc. | System and method for secure remote computer task automation |
| JP4987820B2 (en) * | 2008-08-11 | 2012-07-25 | 日本電信電話株式会社 | Authentication system, connection control device, authentication device, and transfer device |
| US8176214B2 (en) | 2008-10-31 | 2012-05-08 | Silicon Image, Inc. | Transmission of alternative content over standard device connectors |
| GB2466071B (en) | 2008-12-15 | 2013-11-13 | Hewlett Packard Development Co | Associating a signing key with a software component of a computing platform |
| FR2941584B1 (en) | 2009-01-27 | 2011-04-01 | St Nxp Wireless France | METHOD OF PROCESSING DATA STREAMS RECEIVED BY A WIRELESS COMMUNICATION APPARATUS AND REQUIRING AT LEAST PART OF CRYPTOGRAPHIC PROCESSING AND APPARATUS THEREOF |
| US8341318B2 (en) | 2009-03-16 | 2012-12-25 | Apple Inc. | Techniques for facilitating communication between an accessory and a mobile computing device using application specific protocols |
| KR101537706B1 (en) | 2009-04-16 | 2015-07-20 | 엘지전자 주식회사 | Mobile terminal and control method thereof |
| US20100277415A1 (en) | 2009-04-30 | 2010-11-04 | Sony Ericsson Mobile Communications Ab | Multimedia module for a mobile communication device |
| CN101562621B (en) * | 2009-05-25 | 2013-05-22 | 阿里巴巴集团控股有限公司 | User authorization method and system and device thereof |
| US8224170B2 (en) | 2009-06-28 | 2012-07-17 | Kevin James King | Photographic control system, devices and method |
| US8626932B2 (en) | 2009-09-01 | 2014-01-07 | Apple Inc. | Device-dependent selection between modes for asymmetric serial protocols |
| US8397306B1 (en) | 2009-09-23 | 2013-03-12 | Parallels IP Holdings GmbH | Security domain in virtual environment |
| US8244231B2 (en) | 2009-09-30 | 2012-08-14 | Research In Motion Limited | Method and apparatus for disambiguating an emergency call attempt during password entry for unlocking a mobile communication device |
| US8327059B2 (en) | 2009-09-30 | 2012-12-04 | Vmware, Inc. | System and method to enhance memory protection for programs in a virtual machine environment |
| KR20110049230A (en) | 2009-11-04 | 2011-05-12 | 삼성전자주식회사 | Multi SIM terminal including a plurality of transmission keys and its operation method |
| US8966657B2 (en) * | 2009-12-31 | 2015-02-24 | Intel Corporation | Provisioning, upgrading, and/or changing of hardware |
| US8634873B2 (en) | 2010-03-17 | 2014-01-21 | Microsoft Corporation | Mobile communication device having multiple, interchangeable second devices |
| US8631185B2 (en) | 2010-09-15 | 2014-01-14 | Standard Microsystems Corporation | Method and system for transferring high-speed data within a portable device |
| US8689004B2 (en) | 2010-11-05 | 2014-04-01 | Microsoft Corporation | Pluggable claim providers |
| AU2011202836B2 (en) | 2010-12-21 | 2014-04-10 | Lg Electronics Inc. | Mobile terminal and method of controlling a mode screen display therein |
| CN102158599B (en) | 2011-03-15 | 2013-09-04 | 上海艾为电子技术有限公司 | Wireless terminal and multi-SIM (subscriber identity module) card connecting device thereof |
| WO2012156586A2 (en) | 2011-05-18 | 2012-11-22 | Nokia Corporation | Secure boot with trusted computing group platform registers |
| CN102853966A (en) | 2011-06-30 | 2013-01-02 | 扬州市嘉禾仪表有限公司 | Pressure gauge damper |
| US20130036377A1 (en) | 2011-08-05 | 2013-02-07 | Nokia Corporation | Controlling responsiveness to user inputs |
| US9171139B2 (en) | 2011-08-05 | 2015-10-27 | Vmware, Inc. | Lock screens to access work environments on a personal mobile device |
| US8494585B2 (en) | 2011-10-13 | 2013-07-23 | The Boeing Company | Portable communication devices with accessory functions and related methods |
| WO2013061156A2 (en) | 2011-10-27 | 2013-05-02 | Cell Rox, Ltd. | Systems and method for implementing multiple personas on mobile technology platforms |
| JP5713244B2 (en) | 2012-01-17 | 2015-05-07 | 日立金属株式会社 | Network system |
| US9075913B2 (en) * | 2012-02-27 | 2015-07-07 | Qualcomm Incorporated | Validation of applications for graphics processing unit |
| CN103369456B (en) | 2012-03-29 | 2016-08-17 | 英华达(上海)科技有限公司 | Mobile phone antitheft system and method thereof |
| US9256506B1 (en) * | 2012-06-04 | 2016-02-09 | Google Inc. | System and method for performing operations on target servers |
| CN102724647B (en) * | 2012-06-06 | 2014-08-13 | 电子科技大学 | Method and system for access capability authorization |
| US20140007087A1 (en) | 2012-06-29 | 2014-01-02 | Mark Scott-Nash | Virtual trusted platform module |
| US8983543B2 (en) | 2012-09-12 | 2015-03-17 | Li Li | Methods and apparatus for managing data within a secure element |
| US8874916B2 (en) | 2012-09-28 | 2014-10-28 | Intel Corporation | Introduction of discrete roots of trust |
| CN102984252B (en) * | 2012-11-26 | 2015-04-08 | 中国科学院信息工程研究所 | Cloud resource access control method based on dynamic cross-domain security token |
| US9264413B2 (en) * | 2012-12-06 | 2016-02-16 | Qualcomm Incorporated | Management of network devices utilizing an authorization token |
| US9503268B2 (en) * | 2013-01-22 | 2016-11-22 | Amazon Technologies, Inc. | Securing results of privileged computing operations |
| CN104969234B (en) | 2013-03-06 | 2018-06-12 | 英特尔公司 | Measured root of trust for virtual machines |
-
2013
- 2013-09-12 US US14/025,560 patent/US9819661B2/en active Active
-
2014
- 2014-06-18 TW TW107134432A patent/TWI674533B/en active
- 2014-06-18 TW TW103120995A patent/TWI640893B/en active
- 2014-07-01 CA CA2922158A patent/CA2922158C/en active Active
- 2014-07-01 RU RU2016104645A patent/RU2675902C2/en active
- 2014-07-01 JP JP2016541960A patent/JP2016535547A/en active Pending
- 2014-07-01 ES ES14748330T patent/ES2802265T3/en active Active
- 2014-07-01 WO PCT/US2014/045022 patent/WO2015038220A1/en not_active Ceased
- 2014-07-01 EP EP14748330.9A patent/EP3039604B1/en active Active
- 2014-07-01 KR KR1020167009198A patent/KR102217941B1/en active Active
- 2014-07-01 SG SG11201601108YA patent/SG11201601108YA/en unknown
- 2014-07-01 BR BR112016004501-7A patent/BR112016004501B1/en active IP Right Grant
- 2014-07-01 CN CN201480050437.4A patent/CN105531710B/en active Active
-
2019
- 2019-09-20 JP JP2019171659A patent/JP7086908B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| RU2016104645A (en) | 2017-10-17 |
| BR112016004501B1 (en) | 2022-01-04 |
| KR102217941B1 (en) | 2021-02-19 |
| RU2675902C2 (en) | 2018-12-25 |
| KR20160054555A (en) | 2016-05-16 |
| TWI674533B (en) | 2019-10-11 |
| CN105531710B (en) | 2020-07-07 |
| ES2802265T3 (en) | 2021-01-18 |
| TWI640893B (en) | 2018-11-11 |
| JP2016535547A (en) | 2016-11-10 |
| TW201905688A (en) | 2019-02-01 |
| CN105531710A (en) | 2016-04-27 |
| EP3039604B1 (en) | 2020-04-29 |
| TW201518989A (en) | 2015-05-16 |
| JP7086908B2 (en) | 2022-06-20 |
| JP2020005310A (en) | 2020-01-09 |
| WO2015038220A1 (en) | 2015-03-19 |
| SG11201601108YA (en) | 2016-03-30 |
| US9819661B2 (en) | 2017-11-14 |
| CA2922158A1 (en) | 2015-03-19 |
| US20150074764A1 (en) | 2015-03-12 |
| EP3039604A1 (en) | 2016-07-06 |
| BR112016004501A2 (en) | 2017-08-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10244578B2 (en) | Mobile communication device and method of operating thereof | |
| CA2922158C (en) | Method of authorizing an operation to be performed on a targeted computing device | |
| CA2922157C (en) | Mobile communication device and method of operating thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| EEER | Examination request |
Effective date: 20180215 |
|
| EEER | Examination request |
Effective date: 20180215 |
|
| EEER | Examination request |
Effective date: 20180215 |
|
| EEER | Examination request |
Effective date: 20180215 |
|
| EEER | Examination request |
Effective date: 20180215 |
|
| EEER | Examination request |
Effective date: 20180215 |
|
| EEER | Examination request |
Effective date: 20180215 |
|
| MPN | Maintenance fee for patent paid |
Free format text: FEE DESCRIPTION TEXT: MF (PATENT, 11TH ANNIV.) - STANDARD Year of fee payment: 11 |
|
| U00 | Fee paid |
Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U00-U101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE REQUEST RECEIVED Effective date: 20250627 |
|
| U11 | Full renewal or maintenance fee paid |
Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT PAID IN FULL Effective date: 20250627 |